Examining the State and Market Forces Behind Information Control in China

Total Page:16

File Type:pdf, Size:1020Kb

Examining the State and Market Forces Behind Information Control in China Delegated Dictatorship: Examining the State and Market Forces behind Information Control in China by Blake Miller A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Political Science and Scientific Computing) in The University of Michigan 2018 Doctoral Committee: Professor Mary Gallagher, Chair Professor Pauline Jones Professor Walter Mebane Professor Nicholas Valentino Blake Miller [email protected] ORCID iD: 0000-0002-4707-0984 c Blake Miller 2018 All Rights Reserved ACKNOWLEDGEMENTS The seed of this dissertation was planted in 2008 when I was fortunate enough to meet Larry Diamond and to take the excellent Chinese Politics class taught by Alice Miller as an undergraduate at Stanford University. I spent the next 3 years as Larry's research assistant, studying internet censorship in China, and became fascinated by the online conflict between state and society that seemed to be pushing China in a more open, liberal, and democratic direction. Larry encouraged me to go to China and conduct fieldwork for an undergraduate thesis on the use of the internet to control dissent. Semi-structured interviews with the signers and drafters of Charter 08 opened my eyes to the real-world consequences of online dissent in authoritarian regimes. This experience provided a strong foundation upon which I built my graduate school research agenda. I am incredibly grateful to Alice Miller and Larry Diamond for their support and encouragement at this early stage. Going through graduate school and writing a dissertation is an extraordinarily difficult and stressful process. I was very fortunate to have many kind, thoughtful, and supporting friends, family members, mentors, and research assistants who made the process easier, and an incredibly meaningful and rewarding experience. Thanks to my parents, Blake and Jeryl Miller for your encouragement and support throughout grad school. Thanks as well to my brother Luke Miller and his partner Lisa Quadt, two grad school veterans who are always supportive and thoughtful. To the friends and fellow graduate students I met on my first day at Michi- gan, Sasha de Vogel, Zander Furnas, Joseph Klaver, Steven Moore, and Michael ii Thompson-Brusstar, thanks for being the most amazing group of friends throughout the entirety of my time at Michigan. You were always supportive when I doubted my work, always listened to me when I was feeling discouraged, and always made sure that I took breaks when I needed them. To Nicole Wu, thanks for being a great friend throughout my time at Michigan, for sending me ALL the cute dog pictures, and for double-checking my attempts to translate Mandarin into English. Thanks to all of the other friends and acquaintances in Ann Arbor who made grad school a pleasant and memorable experience. Thanks to my dissertation committee Mary Gallagher, Walter Mebane, Pauline Jones, and Nicholas Valentino for their incredible feedback, generosity, and thought- fulness. Mary, thanks for your honest and frank feedback in our many meetings together, for helping me focus and expand my research agenda when necessary, for fostering a community of grad students studying China, and for taking the time to introduce me to scholars outside of Michigan who have mentored me throughout my time at Michigan. Walter, thank you for encouraging me in my interest in machine learning and natural language processing early on in grad school, for your generosity with time and resources, and for allowing me to use your personal server for data col- lection, even when it slowed your own work down (sorry about that again). Pauline, thanks for keeping me honest when it came to theory development and for pushing me to be more systematic in my research process. Thank you Nick for helping me with the design of my survey experiments, and for telling me not to worry when I was unnecessarily concerned about outcomes of grants, funding, and the job market. Thank you to Daniela Stockmann, who hosted me multiple times in Berlin and in Shanghai, and who has become an incredible mentor and friend. Thanks to Yuhua Wang, Iza Ding, and Jeffrey Javed for mentorship and feedback during grad school that undoubtedly has made me a better scholar, and has improved the quality of my work. iii Thanks to Yuen Yuen Ang, Christian Davenport, Chris Fariss, Allen Hicken, Brian Min, James Morrow, Ragnhild Nordas, Iain Osgood, and Charles Shipan for their feedback at workshops and meetings at the University of Michigan. Thank you to Margaret Roberts, Haifeng Huang, Pierre Landry, and Bruce Dickson for your feedback on my work. This dissertation would not have been possible without the excellent research assistantship of Emma, Leon, Shannon, Qiwei, Moira, Zhang, Martin, Chen, Erin, Yingsi, Jack, Ziyi, and Sherry. Thanks for your dedication and hard work that has resulted in the datasets used in this dissertation. Thanks to Sweetland Writing Center at the University of Michigan for arranging dissertation writing groups and providing excellent writing help. Thanks to Simone Sessolo for reading many drafts of my chapters. Thanks to my dissertation writing group members Angie Baecker, Chinbo Chong, and Nicole Hentrich for workshop- ping my writing. Thanks as well to The University of Michigan's Asia Library and particularly the help of Liangyu Fu who helped me obtain many of the fascinating government documents and manuals that informed my research. Thanks to the amazing group of researchers at The Citizen Lab at University of Toronto for helping me with my work and inspiring me with all of their amazing re- search. Thanks especially to Masashi Crete-Nishihata, Ron Diebert, Jeffrey Knockel, and Lotus Ruan for reading and commenting on early drafts of chapters. iv TABLE OF CONTENTS ACKNOWLEDGEMENTS :::::::::::::::::::::::::: ii LIST OF FIGURES ::::::::::::::::::::::::::::::: viii LIST OF TABLES :::::::::::::::::::::::::::::::: ix ABSTRACT ::::::::::::::::::::::::::::::::::: x CHAPTER I. Introduction: Delegation and Covert Censorship in China .1 1.1 The Puzzle of Imperfect Information Control In China....3 1.2 Maximalist Censorship Strategy and Covert Implementation.6 1.3 A Brief History of Information Control In China.......9 1.3.1 Pre-Internet Information Controls..........9 1.3.2 Post-Internet Information Controls.......... 12 1.4 How Corporate-Delegated Censorship Works......... 15 1.5 Data................................ 16 1.5.1 Leaked Censorship Logs................ 17 1.5.2 Measures of Censorship (Free Weibo and Weiboscope) 20 1.6 Roadmap............................. 20 II. Covert Censorship ........................... 24 2.1 Introduction........................... 24 2.2 Background............................ 25 2.2.1 Types of Censorship.................. 25 2.2.2 Types of Censorship at Sina Weibo......... 27 2.3 Covert Censorship........................ 29 2.4 The Market Logic of Covert Censorship............ 30 2.5 Empirical Analysis........................ 32 2.6 Discussion............................ 34 2.7 Conclusion............................ 36 v III. The Limits of Commercialized Censorship in China ...... 37 3.1 The Southern Weekend Incident................ 38 3.2 Delegation, Fragmentation, and Agency Loss......... 40 3.2.1 Corporate Delegation Leads to Agency Loss.... 41 3.2.2 Bureaucratic Fragmentation Leads to Agency Loss. 43 3.3 Data and Methods........................ 45 3.3.1 Log Data........................ 46 3.3.2 Event Data....................... 47 3.3.3 Censorship Outcomes Data.............. 48 3.4 Empirical Implications and Results............... 49 3.4.1 Corporate Delegation Leads to Agency Loss.... 50 3.4.2 Bureaucratic Fragmentation Leads to Agency Loss. 53 3.5 Conclusion............................ 58 3.6 Developments Since 2014.................... 59 3.7 Beyond China.......................... 60 IV. Reassessing the Targets of China's Online Censorship Appa- ratus ................................... 64 4.1 Introduction........................... 65 4.2 Collective Action Potential vs. Low Censorship Capacity... 66 4.3 Data and Methods........................ 67 4.3.1 Leaked Log Data................... 67 4.3.2 Coding Procedure................... 69 4.3.3 Empirical Expectations................ 72 4.4 Results.............................. 73 4.5 Discussion............................ 75 4.5.1 Beyond Collective Action Potential......... 76 4.5.2 Why Government Intent Should Not be Inferred from Censorship Outcomes................. 77 4.6 Conclusion............................ 79 V. Automated Detection of Chinese Government Astroturfers Using Network and Social Metadata ............... 80 5.1 Introduction........................... 80 5.2 Identifying Government Astroturfers.............. 84 5.2.1 What We Know About Government Astroturfers.. 84 5.2.2 Labeling Observations................. 87 5.2.3 What are the Defining Attributes of Government As- troturfer Behavior?.................. 88 5.2.4 Rules for Automatically Labeling Comments.... 88 5.3 Government Weibo Account Classifier............. 93 vi 5.3.1 Features........................ 94 5.3.2 Labeling Government Accounts........... 95 5.3.3 Performance of Government Weibo Classifier.... 96 5.3.4 Network Structure and Inferring the Bureaucratic Affiliation of Astroturfers............... 97 5.4 Government Astroturfer Classifier............... 98 5.4.1 Text Features..................... 99 5.4.2 Performance of Classifiers............... 100 5.4.3 Estimated Percent of Government Astroturfers in News Comment Sections..................
Recommended publications
  • Reporters Without Borders TV5 Monde Prize 2015 Nominees
    Reporters Without Borders ­ TV5 Monde Prize 2015 Nominees Journalist Category Mahmoud Abou Zeid, aka Shawkan (Egypt) “I am a photojournalist, not a criminal,” Shawkan wrote from Tora prison in February. “My ​ ​ ​ indefinite detention is psychologically unbearable. Not even animals would survive in these conditions." ​ Shawkan is an Egyptian freelance photojournalist who has been in pre­trial detention for more than 760 days. He was arrested on 14 August 2013 while providing the US photojournalism agency Demotix and the US digital media company Corbis with coverage of ​ ​ ​ ​ the violence used to disperse demonstrations by deposed President Mohamed Morsi’s supporters in Rabiaa Al­Awadiya Square. Three journalists were killed that day in connection with their work Aged 28, Shawkan covered developments in Egypt closely from Mubarak’s fall to Morsi’s overthrow and on several occasions obtained striking shots of the popular unrest. His detention became illegal in August of this year because, under Egyptian law, pre­trial detention may surpass two years only in exceptional cases. Few people in Egypt have ever been held pending trial as long as him. A date has finally been set for the start of his trial, 12 December 2015, when he will be prosecuted before a Cairo criminal court along with more than 700 other defendants including members of the Muslim Brotherhood, which was declared a terrorist organization in December 2013. Many charges have been brought against him without any evidence, according to his lawyer, Karim Abdelrady. The most serious include joining a banned organization [the Muslim Brotherhood], murder, attacking the security forces and possession of weapons.
    [Show full text]
  • An Examination of the Impact of Astroturfing on Nationalism: A
    social sciences $€ £ ¥ Article An Examination of the Impact of Astroturfing on Nationalism: A Persuasion Knowledge Perspective Kenneth M. Henrie 1,* and Christian Gilde 2 1 Stiller School of Business, Champlain College, Burlington, VT 05401, USA 2 Department of Business and Technology, University of Montana Western, Dillon, MT 59725, USA; [email protected] * Correspondence: [email protected]; Tel.: +1-802-865-8446 Received: 7 December 2018; Accepted: 23 January 2019; Published: 28 January 2019 Abstract: One communication approach that lately has become more common is astroturfing, which has been more prominent since the proliferation of social media platforms. In this context, astroturfing is a fake grass-roots political campaign that aims to manipulate a certain audience. This exploratory research examined how effective astroturfing is in mitigating citizens’ natural defenses against politically persuasive messages. An experimental method was used to examine the persuasiveness of social media messages related to coal energy in their ability to persuade citizens’, and increase their level of nationalism. The results suggest that citizens are more likely to be persuaded by an astroturfed message than people who are exposed to a non-astroturfed message, regardless of their political leanings. However, the messages were not successful in altering an individual’s nationalistic views at the moment of exposure. The authors discuss these findings and propose how in a long-term context, astroturfing is a dangerous addition to persuasive communication. Keywords: astroturfing; persuasion knowledge; nationalism; coal energy; social media 1. Introduction Astroturfing is the simulation of a political campaign which is intended to manipulate the target audience. Often, the purpose of such a campaign is not clearly recognizable because a political effort is disguised as a grassroots operation.
    [Show full text]
  • Pacer Emerging Markets Cash Cows 100 ETF Schedule of Investments July 31, 2020 (Unaudited) Shares Value
    Page 1 of 5 Pacer Emerging Markets Cash Cows 100 ETF Schedule of Investments July 31, 2020 (Unaudited) Shares Value COMMON STOCKS - 91.4% Bermuda - 0.9% Nine Dragons Paper Holdings Ltd. 8,922 $ 9,336 Brazil - 11.1% Ambev SA - ADR 7,396 19,821 BRF SA - ADR (a) 2,000 7,960 CCR SA 2,652 7,651 Cosan SA 386 6,660 CPFL Energia SA 1,795 10,787 Engie Brasil Energia SA 740 6,527 JBS SA 4,938 20,513 Petrobras Distribuidora SA 1,561 6,823 TIM Participacoes SA - ADR 510 7,619 Vale SA - ADR 1,878 21,860 116,221 Cayman Islands - 3.4% SINA Corp./China (a) 222 8,958 Tongcheng-Elong Holdings Ltd. (a) 1,612 2,957 Xiaomi Corp. - Class B (a)(b) 12,393 23,698 35,613 Chile - 0.7% Cencosud SA 4,410 7,683 China - 12.8% Air China Ltd. - Class H 29,824 18,509 Anhui Conch Cement Co. Ltd. - Class H 2,910 21,984 Beijing Capital International Airport Co Ltd. - Class H 5,986 3,947 China Communications Services Corp Ltd. - Class H 8,207 5,316 China Eastern Airlines Corp. Ltd. - Class H 52,387 18,588 China Shenhua Energy Co Ltd. - Class H 12,317 20,533 China Telecom Corp. Ltd. - Class H 65,857 19,629 Great Wall Motor Co. Ltd. - Class H 20,076 19,609 Sinopec Shanghai Petrochemical Co. Ltd. 26,213 5,851 133,966 Colombia - 1.8% Ecopetrol SA - ADR 1,602 18,647 Greece - 0.9% Hellenic Telecommunications Organization SA 483 7,112 OPAP SA 283 2,544 9,656 Hong Kong - 8.5% China Medical System Holdings Ltd.
    [Show full text]
  • Baker Institute Policy Report Published by the James A
    ISSN 1941-6466 BAKER INSTITUTE POLICY REPORT PUBLISHED BY THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY NUMBER 57 JANUARY 2014 BUILDING A TRANSPARENT WEB: TRANSNATIONAL SOCIAL MEDIA, CYBERSECURITY, AND SINO –U.S. TRADE Overview practices. In 2007, when the United States leveraged its initial WTO complaint against China, the Social media sites, while currently treated as an terms of the debate were substantially different “audiovisual product”1 by the Chinese government than they are now. Seven years ago, audiovisual under the World Trade Organization’s (WTO) materials were much more easily decoupled from trade policy, have outgrown this construct and their digital distribution sites.5 However, in the instead have become the “ports”2 of the twenty- current environment, delivery portals are so first century. Taking into consideration the global deeply entwined with the dispersal of content trade significance of social media as a locus of that it has become nearly impossible to make international trade in advertising, information, cogent international policy based on distinctions and increasingly other types of commercial goods, between digital “audiovisual products” and it is essential that the United States continues to digital distribution sites.6,7 Indeed, because these pursue WTO action to encourage China to open sites have become so central to the experience trade in social media infrastructure. This, in turn, of media consumption, as well as a host of other would ensure long-term global competitiveness in activities ranging from commerce to social life, it the information communication and technology is essential to take into account these complexities sector.
    [Show full text]
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • Political Astroturfing Across the World
    Political astroturfing across the world Franziska B. Keller∗ David Schochy Sebastian Stierz JungHwan Yang§ Paper prepared for the Harvard Disinformation Workshop Update 1 Introduction At the very latest since the Russian Internet Research Agency’s (IRA) intervention in the U.S. presidential election, scholars and the broader public have become wary of coordi- nated disinformation campaigns. These hidden activities aim to deteriorate the public’s trust in electoral institutions or the government’s legitimacy, and can exacerbate political polarization. But unfortunately, academic and public debates on the topic are haunted by conceptual ambiguities, and rely on few memorable examples, epitomized by the often cited “social bots” who are accused of having tried to influence public opinion in various contemporary political events. In this paper, we examine “political astroturfing,” a particular form of centrally co- ordinated disinformation campaigns in which participants pretend to be ordinary citizens acting independently (Kovic, Rauchfleisch, Sele, & Caspar, 2018). While the accounts as- sociated with a disinformation campaign may not necessarily spread incorrect information, they deceive the audience about the identity and motivation of the person manning the ac- count. And even though social bots have been in the focus of most academic research (Fer- rara, Varol, Davis, Menczer, & Flammini, 2016; Stella, Ferrara, & De Domenico, 2018), seemingly automated accounts make up only a small part – if any – of most astroturf- ing campaigns. For instigators of astroturfing, relying exclusively on social bots is not a promising strategy, as humans are good at detecting low-quality information (Pennycook & Rand, 2019). On the other hand, many bots detected by state-of-the-art social bot de- tection methods are not part of an astroturfing campaign, but unrelated non-political spam ∗Hong Kong University of Science and Technology yThe University of Manchester zGESIS – Leibniz Institute for the Social Sciences §University of Illinois at Urbana-Champaign 1 bots.
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Setting the Record Straighter on Shadow Banning
    Setting the Record Straighter on Shadow Banning Erwan Le Merrer, Benoˆıt Morgan, Gilles Tredan,´ Univ Rennes, Inria, CNRS, Irisa IRIT/ENSHEEIT LAAS/CNRS [email protected] [email protected] [email protected] Abstract—Shadow banning consists for an online social net- happens on the OSN side, collecting information about po- work in limiting the visibility of some of its users, without them tential issues is difficult. In this paper, we explore scientific being aware of it. Twitter declares that it does not use such approaches to shed light on Twitter’s alleged shadow banning a practice, sometimes arguing about the occurrence of “bugs” to justify restrictions on some users. This paper is the first to practice. Focusing on this OSN is crucial because of its central address the plausibility of shadow banning on a major online use as a public communication medium, and because potential platform, by adopting both a statistical and a graph topological shadow banning practices were recently commented. approach. Shadow banning and moderation techniques. shadow banning We first conduct an extensive data collection and analysis (SB or banning for short, also known as stealth banning [6]) campaign, gathering occurrences of visibility limitations on user profiles (we crawl more than 2:5 millions of them). In such is an online moderation technique used to ostracise undesired a black-box observation setup, we highlight the salient user user behaviors. In modern OSNs, shadow banning would refer profile features that may explain a banning practice (using to a wide range of techniques that artificially limit the visibility machine learning predictors).
    [Show full text]
  • Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition
    Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition Arjun Panesar Machine Learning and AI for Healthcare Arjun Panesar Coventry, UK ISBN-13 (pbk): 978-1-4842-6536-9 ISBN-13 (electronic): 978-1-4842-6537-6 https://doi.org/10.1007/978-1-4842-6537-6 Copyright © 2021 by Arjun Panesar This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made.
    [Show full text]
  • How the Chinese Government Fabricates Social Media Posts
    American Political Science Review (2017) 111, 3, 484–501 doi:10.1017/S0003055417000144 c American Political Science Association 2017 How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument GARY KING Harvard University JENNIFER PAN Stanford University MARGARET E. ROBERTS University of California, San Diego he Chinese government has long been suspected of hiring as many as 2 million people to surrep- titiously insert huge numbers of pseudonymous and other deceptive writings into the stream of T real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim https://doi.org/10.1017/S0003055417000144 . or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime.
    [Show full text]
  • Information Systems in Great Power Competition with China
    STRATEGIC STUDIES QUARTERLY - PERSPECTIVE Decide, Disrupt, Destroy: Information Systems in Great Power Competition with China AINIKKI RIIKONEN Abstract Technologies for creating and distributing knowledge have impacted international politics and conflict for centuries, and today the infrastructure for communicating knowledge has expanded. These technologies, along with attempts to exploit their vulnerabilities, will shape twenty-first- century great power competition between the US and China. Likewise, great power competition will shape the way China develops and uses these technologies across the whole spectrum of competition to make decisions, disrupt the operational environment, and destroy adversary capabilities. ***** he 2018 US National Defense Strategy (NDS) cites Russia and the People’s Republic of China (PRC) as “revisionist powers” that “want to shape a world consistent with their authoritarian model— gaining veto authority over other nations’ economic, diplomatic, and secu- T 1 rity decisions.” It describes these countries as competitors seeking to use “other areas of competition short of open warfare to achieve their [au- thoritarian] ends” and to “optimize their targeting of our battle networks and operational concepts.”2 The NDS assesses that competition will occur along the entire spectrum of statecraft from peace to open conflict and that Russia and the PRC will align their foreign policies with their models of governance. If this assessment is correct, and if technology plays a sig- nificant role in international politics, then technology will affect the whole spectrum of great power competition and conflict. Information architec- ture—the structures of technology that collect and relay information worldwide—is innately connected to power projection. The PRC has been innovating in this area, and its expanded information capabilities—and risks to US capabilities—will shape competition in the twenty- first cen- tury.
    [Show full text]